Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Data Center > 300-635

300-635 Automating Cisco Data Center Solutions (DCAUTO) Question and Answers

Question # 4

Using the NX-API CLI JSON-RPC interface, which two Python data structure and requests call create an SVI? (Choose

A.

Option

B.

Option

C.

Option

D.

Option

Full Access
Question # 5

What are two capabilities of the DCNM REST API? (Choose two.)

A.

uses the dcnm-token header for requests authentication after initial basic authentication

B.

uses basic authentication without encoding for username and password

C.

supports HTTP until release 11.0

D.

uses bearer key authorization

E.

is separated into Classic LAN, LAN Fabric, Media Controller, and SAN Management categories.

Full Access
Question # 6

Which two bootstrap technologies are supported by Cisco NX-OS platforms? (Choose two )

A.

iPXE

B.

PNP

C.

POAP

D.

BOOTP

E.

DHCP

Full Access
Question # 7

Which authentication method is used when the REST API of the Cisco UCS Director is accessed?

A.

Bearer ((Bearer Token))

B.

HTTP Basic Auth

C.

RestAuth: ((User's Auth Token))

D.

X-Cloupia-Request-Key: ((User's Auth Token))

Full Access
Question # 8

Drag and drop the code to complete an Ansible playbook that creates a new tenant. Not all options are used.

Full Access
Question # 9

Which two benefits of using network configuration tools such as Ansible and Puppet to automate data center platforms are valid? (Choose two )

A.

consistency of systems configuration

B.

automation of repetitive tasks

C.

ability to create device and interface groups

D.

ability to add VLANs and routes per device

E.

removal of network protocols such as Spanning Tree

Full Access
Question # 10

Which two capabilities apply to the DCNM API? (Choose two)

A.

DCNM provides an XML-based SOAP API

B.

DCNM requires a license to use the API

C.

Some features of DCNM must be configured through the GUI

D.

All API operations can be performed using the DCNM GUI

E.

DCNM provides a REST-based API

Full Access
Question # 11

Refer to the Exhibit:

Refer to the exhibit: The script is called deltacounters.py and it is currently inside a Guest Shell container running inside a Cisco NX-OS switch.

Which Cisco NX-OS command results in a successful execution of this script?

A.

python /home/admjn/bootflash;deltacounters.py ethernet1/1

B.

show python bootf1ash:deltacounters.py ethernet1/1

C.

guestshell run python /home/admin/deltacounter.py ethernet1/1

D.

guestshell execute python /home/admin/deltacounter.py ethernet1/1

Full Access
Question # 12

An engineer is implementing a Cisco Nexus switch. Which command executes an Ansible playbook called n9k.yml?

A.

ansible-playbook n9k.yml

B.

ansible-playbook -f n9k.yml -run now

C.

ansible-playbook -f n9k.yml

D.

ansible-playbook -f N9K.yml

Full Access
Question # 13

Which two statements apply to authentication when using the Cisco Intersight API? (Choose two.)

A.

Each API Key can be assigned specific roles but not privileges.

B.

Secret Key is only available at API Key creation time

C.

An API Key is composed of a Key ID and Secret Key

D.

The user credentials for the cisco.com accounts are shared with the Cisco Intersight Web Service

E.

An API Key is composed of a keyld and sessionCookie

Full Access
Question # 14

When the Cisco bigmuddy-network-telematry-collector from GitHub is used, which command displays only the message headers?

A.

-print

B.

-all

C.

-brief

D.

-print-all

Full Access
Question # 15

Which two statements describe the authentication method used with Cisco Intersight REST API Requests? (Choose two.)

A.

The REST API request contains a base64-encoded signature of the message content and headers.

B.

The REST API request message body is encoded as a SHA384 hash and then signed with the API Key ID.

C.

The Cisco Intersight Web service verifies the signature of incoming request with the RSA public key for the API Key ID.

D.

The incoming REST API request is challenged by the Cisco Intersight Web service with a request for the RSA private key

E.

The message body is encoded as a SHA256 hash if the message body is not empty and then signed with the API Key ID

Full Access
Question # 16

During the process of starting a Python network telemetry collector, which command starts the Cisco bigmuddy-network-telemetry-collector from GitHub?

A.

model driven telemetry

B.

telemetry_receiver.py --ip-address -port

C.

telemetry_receiver.py --destination -uri

D.

streaming telemetry

Full Access
Question # 17

What is the network bootstrap program used by Cisco NX-OS iPXE?

A.

NETBOOT

B.

NX-OS iPXE

C.

iPXE-POAP

D.

Mini-OS

Full Access
Question # 18

A set of automation scripts work with no issue from a local machine, but an experiment needs to take place with a new package found online.

How is this new package isolated from the main code base?

A.

Add the new package to your requirements txt file.

B.

Create a new virtual machine and perform a pip install of the new package

C.

Perform a pip install of the new package when logged into your local machine as root

D.

Create a new virtual environment and perform a pip install of the new package

Full Access
Question # 19

When Cisco Nexus switches are implemented, which command requires the method key to perform a POST operation using the NXAPI-CLIJSON-RPC interface?

A.

cli

B.

cli_conf

C.

cli_show

D.

cli_post

Full Access
Question # 20

Which two application isolation options are available when Kubernetes is deployed with the ACI CNI plug-in? (Choose two.)

A.

Process Isolation

B.

Namespace Isolation

C.

Cluster Isolation

D.

Server Isolation

E.

VM Isolation

Full Access
Question # 21

Which two initial actions should be taken when exploring automation capabilities for ACI? (Choose Two)

A.

Write scripts that leverage the Python Standard Library

B.

Look for an open-source package or SDK

C.

Use the API Inspector and test API Calls

D.

Develop an open-source package or SDK

E.

Use the ncclient command to explore the NETCONF capabilities

Full Access
Question # 22

A file named myfunc.py has been edited. Drag and drop the steps from left that ensure that this file is committed to the local Git repository and verify its status into the correct order on the right. NOt all options are used.

Full Access